Software Development Risk Assessment for Clouds National Technical University of Ukraine “Kiev Polytechnic Institute” Heat and energy design faculty Department.

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
Course: e-Governance Project Lifecycle Day 1
Joey Yep Technical Marketing, Seagate CSS Creating a Competitive Advantage with Cloud.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Future Work Needed Kenneth Wade Najim Yaqubie. Outline 1.Model is simple 2.Too many assumptions 3.Conflicting internal architectures 4.Security Challenges.
R R R CSE870: Advanced Software Engineering (Cheng): Intro to Software Engineering1 Advanced Software Engineering Dr. Cheng Overview of Software Engineering.
Managing the Information Technology Resource Jerry N. Luftman
COMP8130 and 4130Adrian Marshall 8130 and 4130 Test Management Adrian Marshall.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Cloud Usability Framework
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
Project Risk Management. Learning Objectives  Understand what risk is and the importance of good project risk management.  Identify project risks, describe.
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
Project Management Body of Knowledge PMBOK
Oyinkan Adedun Adeleye Caitlyn Carney Tyler Nguyen.
Banking Clouds V International Youth Banking Forum.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
MIGRATING INTO A CLOUD P. Sai Kiran. 2 Cloud Computing Definition “It is a techno-business disruptive model of using distributed large-scale data centers.
Presentation to the Housing Technology Conference Tim Cowland- Senior Consultant 27 th February 2014 The Rise of the Housing Cloud.
3 Cloud Computing.
SEC835 Database and Web application security Information Security Architecture.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
Chapter 10 Contemporary Project Management Kloppenborg
SUNY FARMINGDALE Computer Programming & Information Systems BCS451 – Cloud Computing Prof. Tolga Tohumcu.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
Apptis Proprietary & Confidential – Do Not Copy Tools and Measures: Project Planning and Control Presented to the NIH Project Management Community October.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Software Engineering Lecture 6: Risk Analysis & Management.
WHAT IS 3D PRINTING? National Technical University of Ukraine “Kiev Polytechnic Institute” Heat and energy design faculty Department of automation design.
National Technical University of Ukraine “Kiev Polytechnic Institute” Heat and energy design faculty Department of automation design of energy processes.
A POWER OF OLAP TECHNOLOGY National Technical University of Ukraine “Kiev Polytechnic Institute” Heat and energy design faculty Department of automation.
Introduction to Project Management Chapter 9 Managing Project Risk
Project Risk Management. Risk-Defined A situation involving exposure to danger; “The combination of the probability of an event and its consequences”
Automated feedback processing in the educational process VІI SCIENTIFIC AND PRACTICAL SEMINAR WITH INTERNATIONAL PARTICIPATION "ECONOMIC SECURITY OF THE.
VІI scientific and practical seminar with international participation “Economic security of the state and scientific and technological aspects of its provision".
Risk Management for Small & Medium Sized Enterprises
Quick search in documents stored in DBMS InterSystems Caché using IndexTank API VІI scientific and practical seminar with international participation "Economic.
Unit – I Presentation. Unit – 1 (Introduction to Software Project management) Definition:-  Software project management is the art and science of planning.
 Understand the concept and scope of IT Infrastructure  Understand with various components and technologies that make up IT Infrastructure  Learn the.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
3/14/2016 © Crown Copyright. All rights reserved. Risk Managed Cloud Computing HMG IA Approach Ian McCormack TD IA Policy and Risk CESG.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
11 CPIT 456 by Dr. M. Rizwan Jameel Qureshi Chapter 3 Risk Management.
Computers Are Your Future Twelfth Edition
MANAGEMENT INFORMATION SYSTEMS
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
CompTIA Security+ Study Guide (SY0-401)
EI Architecture Overview/Current Assessment/Technical Architecture
Project Management Body of Knowledge PMBOK
IT Architecture Technical blueprint for evolving a corporate infrastructure resource that can be shared by many users and services processing systems hardware.
Hot Topics:Mobility in the Cloud
Introduction to the Federal Defense Acquisition Regulation
The Future? Or the Past and Present?
Computers Are Your Future Twelfth Edition
AWS. Introduction AWS launched in 2006 from the internal infrastructure that Amazon.com built to handle its online retail operations. AWS was one of the.
Introduction to Enterprise Systems
3 Cloud Computing.
"Cloud services" - what it is.
Computers Are Your Future Twelfth Edition
Fundamental Concepts and Models
GRC - A Strategic Approach
IT OPERATIONS Session 7.
Quality & Risk Management
Presentation transcript:

Software Development Risk Assessment for Clouds National Technical University of Ukraine “Kiev Polytechnic Institute” Heat and energy design faculty Department of automation design of energy processes and systems (ADEPS) VІI scientific and practical seminar with international participation “Economic security of the state and scientific and technological aspects of its provision". October 21-22, 2015, Kyiv, Ukraine Students of 6 th department group TI-41m Hanna Shvedova Pavlo Seredin

What is a risk? ◉ effect of uncertainty on objectives, which may or may not happen and caused by ambiguity or a lack of information (ISO (2009) / ISO Guide 73:2002) ◉ any future uncertain event or condition that, if it occurs, has a positive or negative effect on one or more project objectives such as scope, schedule, cost, or quality (PMBOK, 5th Edition) VІI “Economic security of the state and scientific and technological aspects of its provision“ 2

Types of risks Schedule Risk Software development, given the intangible nature and uniqueness of software, is inherently difficult to estimate and schedule. Budget Risk Wrong budget estimation or cost overruns or project scope expansion. Operational Risks The prospect of loss resulting from inadequate or failed procedures, systems or policies. Technology Risks It includes delays arising out of software & hardware defects or the failure of an underlying service or a platform. External Risks All uncertain risks are outside. It can be: running out of fund, market development, changing customer’s priority, government rule changes. Resources Risks Resource issues such as turnover and learning curves are common project risks. VІI “Economic security of the state and scientific and technological aspects of its provision“ 3

Risk management process Define the environment, understand the context. Risk identification is an iterative process. New risks will be identified as the project progresses through the life cycle. Determination of quantitative or qualitative value of risk and a recognized threat enables the organization to understand the business context of their overall vulnerabilities - and prepare for and mitigate loss. Review and monitoring - keep this process and iterate during the project VІI “Economic security of the state and scientific and technological aspects of its provision“ 4 Risk mitigation - follow the typical ways to manage the risk: avoidance (eliminate), reduction, sharing (transfer), retention (accept)

“ Cloud computing is a computing resource deployment and procurement model that enables an organization to obtain its computing resources and applications from any location via an Internet connection.

Usage of clouds ◉ One in every five enterprises in the EU use cloud computing services. ◉ The information and communications sector is the largest adopter of cloud computing services at forty-five percent. ◉ Finland is the leading country for cloud computing in the EU. It is well above the EU average with one in every two enterprises using a form of cloud computing service there. VІI “Economic security of the state and scientific and technological aspects of its provision“ 6

Service models of clouds Infrastructure as a service (IaaS) provides access to server hardware, storage, network capacity, and other fundamental computing resources. Software as a service (SaaS) provides integrated access to a provider’s software applications. Platform as a service (PaaS) provides access to basic operating software and services to develop and use customer-created software applications. VІI “Economic security of the state and scientific and technological aspects of its provision“ 7

Network Dependency Of even bigger concern are the few instances in which customers have lost data, either due to an issue with the cloud provider or with malicious attackers. Typical risks for clouds Ownership Many public cloud providers, including the largest and best known, have clauses in their contracts that explicitly states that the data stored is the provider's - not the customer's. VІI “Economic security of the state and scientific and technological aspects of its provision“ 8

Typical risks for clouds Lack of transparency cloud customers have little insight into the storage location(s) of data, algorithms used by the CSP to provision or allocate computing resources, the specific controls used to secure components of the cloud computing architecture, or how customer data is segregated within the cloud. Security and compliance concerns data is located on hardware outside of the organization’s direct control. Depending on the cloud solution used, a cloud customer organization may be unable to obtain and review network operations or security incident logs because they are in the possession of the CSP. IT organizational changes If cloud computing is adopted to a significant degree, an organization needs fewer internal IT personnel in the areas of infrastructure management, technology deployment, application development, and maintenance. The morale and dedication of remaining IT staff members could be at risk as a result. VІI “Economic security of the state and scientific and technological aspects of its provision“ 9

Web resources: VІI “Economic security of the state and scientific and technological aspects of its provision“ 10

Any questions ? You can find me at Thanks!